Requirements: 1-2 pages see rubric plz
Category: uncategorised
-
Case Study
Review the following lectures:
Project
The project assignment provides a forum for analyzing and evaluating relevant topics of this week on the basis of the course competencies covered.
Introduction:
Midtown Neurology was started by a single physician who had been practicing in the community for nearly twenty years. As the practice grew, it evolved from a mom-n-pop operation to a more complex model. The founding physician recruited four new neurologists to join and continue to help build the practice. Subsequently, however, the new doctors took over and forced him out of the practice.
Tasks:Case Study Six: From Nothing to Something: Defining Governance and Infrastructure in a Small Medical Practice
Read the above case study; your task would be to evaluate this case study utilizing the format below. Make sure to include at least two scholarly/peer-reviewed articles to help support your evaluation.
Case Study Evaluation
- Prepare a written report of the case using the following format:
- Background Statement: What is going on in this case as it relates to the identified major problem?
- What are (only) the key points the reader needs to know in order to understand how you will solve the case?
- Summarize the scenario in your own wordsdo not simply regurgitate the case. Briefly describe the organization, setting, situation, who is involved, who decides what, etc. Specifically identify the major problems and secondary issues.
- What are the real issues? What are the differences? Can secondary issues become major problems?
- Present an analysis of the causes and effects.
- Fully explain your reasoning. Declare your role in a sentence or a short paragraph explaining from which role you will address the major problem and whether you are the chief administrator in the case or an outside consultant called in to advise.
- Regardless of your choice, you must justify in writing as to why you chose that role. What are the advantages and disadvantages of your selected role? Be specific.
- Recognize the strengths and weaknesses of the organization.
- Identify the strengths and weaknesses that exist in relation to the major problem. Again, your focus here should be in describing what the organization is capable of doing (and not capable of doing) with respect to addressing the major problem. Thus, the identified strengths and weaknesses should include those at the managerial level of the problem. For example, if you have chosen to address the problem from the departmental perspective and the department is understaffed, that is a weakness worthy of mentioning. Be sure to remember to include any strengths/weaknesses that may be related to diversity issues.
- Find out alternatives and recommend a solution.
- Describe the two to three alternative solutions you came up with. What feasible strategies would you recommend? What are the pros and cons? State what should be donewhy, how, and by whom. Be specific. Evaluate how you would know when youve gotten there. There must be measurable goals put in place with the recommendations. Money is easiest to measure; what else can be measured? What evaluation plan would you put in place to assess whether you are reaching your goals?
- TIP: Write this section as if you are trying to sell your proposed solution to the organization. Convince the reader that your proposed solution is the best available and that it will work as planned. Make sure that the goals you identify are worth the effort required to achieve them!
To support your work, use your course and text readings and also use the . As in all assignments, cite your sources in your work and provide references for the citations in APA format.
Submission Details:
- Name your file as SU_MHA6999_W1_Project_LastName_FirstName.
- Your assignment should be addressed in a 3 to 6-page document.
- By the due date assigned, submit it to the Submissions Area.
-
Customer support as a profession
Discuss the current and future state of technical and customer support. Companies have taken great strides to improve the quality of their support services, and yet the media continues to report that customer service is poor. Have a conversation with your friends, family, or school peers to discuss the current state of technical and customer support.
Current State: Is service getting better? Why is there such a gap between the efforts companies are making to improve their services and customer perceptions about those services?
Future State: Predict the impact that trends discussed in the chapter and on the discussion board assignment will have on the support industry. How can the support industry respond to these trends and satisfy the needs of their increasingly demanding customers while at the same time maintaining costs?
Instructions:
- Write your answer in a Word document named “[StudentLastName]_Service_Desk_Trends”
- Make sure to include your name, date, title of the assignment, and course name.
- Create a Reference List for all sources used in the document. (Refer to module How to Create a Reference List) The use of Generative AI is not permitted.
- Your answer must be 350 words minimum, in 12-point font.
- Submit your completed document to the assignment in Week 4: Service Desk Trend and Direction (Assignment) (Graded)
-
Algorithms & Data Structures Question
Objective:
The main objective of this assignment is to make efficient use of VPNs as means of secure connections between different locations of an international company. The student will build the company network and then configure Site-to-Site IPsec VPNs between multiple office locations of a fictitious company called Future Tech Enterprises, verify the VPN tunnels, and ensure secure communication between these sites.
Scenario: Global Tech Enterprises
Future Tech Enterprises is a multinational corporation with headquarters in New York and
branch offices in Abu Dhabi and London. The company needs to ensure secure
communication between its offices over the internet. Each site has its own local network, and
the organization wants to establish secure Site-to-Site IPsec VPN tunnels between these
locations to protect sensitive data during transmission.
Network Overview:
New York Office:
Network: 10.11.1.0/24
Router: NY-R1
External IP: 203.0.113.1
Abu Dhabi Office:
Network: 10.22.2.0/24
Router: AD-R1
External IP: 198.51.100.1
London Office:
Network: 10.33.3.0/24
Router: LDN-R1
External IP: 192.0.2.1
Your task is to configure and verify Site-to-Site IPsec VPNs between these three offices to
ensure that all communication over the public internet is encrypted and secure.
Part 1: Understanding Site-to-Site IPsec VPNs (20 points)
Conduct your own research and explain the following questions (Make sure to add the necessary citations):
- List two advantage and two disadvantages of the use of VPNs to connect different sites of this company
- Define what a Site-to-Site IPsec VPN is and explain its relevance to Future Tech Enterprises.
- Describe the different phases of IPsec (IKE Phase 1 and IKE Phase 2) and how they secure communication between the New York, Abu Dhabi and London offices.
- Discuss the encryption and authentication algorithms that would be appropriate for a multinational corporation like Future Tech Enterprises.
- Compare IPSEC Site-to-Site VPNs with any other alternative. List a scenario where IPSEC remains the preferred choice and another scenario where an alternative might be better suited for Future Tech Enterprises.
Part 2: Configuring the Site-to-Site IPsec VPNs (50 points)
Network Topology Setup (10 points)
Using network simulation software (e.g., Cisco Packet Tracer) design a network topology that
includes the New York, Abu Dhabi, and London offices.
Include network address assignments, routing configurations (static routing), and firewall settings as
necessary.
Provide a diagram of the network topology showing how each office connects to the other two.
After configuring static routing test your routing configuration by pinging between office networks. Include screenshots showing successful pings.
IPsec VPN Configuration (30 points)
Configure the IPsec VPN on the routers at each office (NY-R1, AD-R1, LDN-R1). Ensure the
configurations include:
- ISAKMP Policy
- IPsec Transform Set
- Crypto Map
- Access Control Lists (ACLs) for interesting traffic between the sites
- Applying the Crypto Map to the appropriate interfaces
- Document the configuration commands used on each router, explaining the purpose of each
- command.
Verification (10 points)
Verify that the IPsec VPN tunnels are established successfully between all three offices. Provide
output from relevant verification commands (e.g., show crypto isakmp sa, show crypto ipsec
sa).
Demonstrate secure communication between the offices by pinging between devices on
different networks (e.g., from a device in the New York office to a device in the London office)
and observing encrypted traffic. Make sure to add screenshots in the report
Part 3: Testing and Troubleshooting (20 points)
_Testing the VPN Tunnels _(10 points)
Test the VPN tunnels by initiating traffic that matches the ACLs defined in the configuration,
ensuring that communication between New York, Abu Dhabi, and London is secure.
Provide evidence (screenshots or command outputs) showing successful data transmission over
the VPNs.
Part 4: Reflection and Documentation (10 points)
Write a reflection on what you learned during this assignment. Highlight any challenges you
faced, particularly in managing multiple VPN tunnels, and how you overcame them.
** Add references and also sign the Academic Integrity Disclaimer in the report template.
Submission
Each student must submit 2 files in the given order:
- Primary file submission: Full report in a single PDF containing answers to all the Parts along with the screenshots wherever applicable. Name the report firstname_lastname_A1.pdf. Use the following to compile your report.
- Secondary file submission: A packet tracer file. Make sure the user account details under packet tracer file must have username a s your firstname_lastname and email must match your ZU email.
Assignment Information
Length: > 2000 words
Learning Outcomes Added
- : Describe information, network and computer attacks and defenses fundamentals, standards, and security challenges.
- : Evaluate system and network authentication, access control schemes, and components of virtual private networks (VPNs).
Requirements: correct
-
cyb 400 discussion post with 2 replies to peers
Consider this scenario: Management has been proud that sensitive customer information stored in company systems has never been accessed by an unauthorized party. This is a major bragging point with the chief technology officer (CTO). Your supervisor reports directly to the CTO and is always trying to please them. You are responsible for ensuring that this data remains secure.
Sensitive data is stored in a database protected by technical and administrative controls. A scheduled audit report reveals a vulnerability that could be exploited. However, there is no immediate evidence of an adversarial presence or unusual internal traffic. In looking into this matter, you find that a technical control is out of date. You missed installing a patch.
While the company has an incident response plan, invoking that will call for a team response. Does this apparently unexploited vulnerability rise to the level of an incident? With a simple upgrade, the system should be secure.
What should you do and why?
In your initial response, select and defend a course of action. You may consider the following possibilities or craft one of your own:
- Fix the issue and don’t tell anyone. There’s no reason to make a big deal of this minor event.
- Fix the issue and explain to management that there was a problem. They need to know.
- Don’t fix it. Start by reporting the issue internally. Follow the incident response plan.
- Turn this matter over to a colleague for decisions and action; you may be caught up in the investigation and should avoid any conflict of interest.
In response to your peers, play the part of a trusted colleague who wants to give advice. What would you ask or advise in considering your colleague’s decision?
Requirements: discussion post
-
Research Project
The paper should be 35 pages long, typed, double-spaced.
Use 12-point Times New Roman or Arial font.
Use MLA style for documenting sources. (You will learn about MLA style in this Unit.)
Use outside sources to gather information from research. Consult at least five sources, including at least two
print sources.
Incorporate information gathered from research by quoting, paraphrasing, and summarizing.
Document sources within the essay using parenthetical documentation and at the end of the essay
in a works-cited list.
Consult a general source, such as an encyclopedia, for information about your topic. Write 5-7 sentences summarizing what you learned about your topic.
The topic is Animal farm story.
-
I had to attach it.
This course summary assignment is an opportunity for you to provide substantive reflections and insights, as well as address some specific points about the material covered in this course.
The format and style in which you present your information are up to you, as long as it is coherent and logical. There is not a minimum or maximum length, but an expectation that your submissions will be thorough, yet concise, utilizing proper grammar, spelling, and punctuation. Although there may not be a right or wrong answer to the topics, I will be looking for the thoroughness and depth of your posting, the contextualized application of the material to the real world, and how well you present your information.
- Provide substantive reflections and insights about what you learned in this course from your readings/videos, journal postings, peer discussions, and written assignments, relating them to your personal and professional beliefs and experiences.
- Dont simply repeat your postings or provide an overview of all of the course material or an account of your time spent learning. Think more abstractly about how the course expanded your knowledge of the subject matter and the value of the experience.
- Submit a brief summary of one specific learning object in this course (i.e. Discussion, Critical Thinking Journal, Written Assignment, Project, etc.) in which you learned something significant, practical, and useful that you did not know or completely understand prior to your research and submission. Identify what that particular element was, why you chose it, and how it can be incorporated into a real-life situation or environment.
- Discuss any additional thoughts, reflections, and introspects that you have about the material in this course. Boba Santos, Rachel (2023). Crime Analysis with Crime Mapping, 5th Ed., Sage. This is the book.
Requirements: see instructions
- Provide substantive reflections and insights about what you learned in this course from your readings/videos, journal postings, peer discussions, and written assignments, relating them to your personal and professional beliefs and experiences.
-
Education & Teaching Question
EDPT 514 Candidates,
Review the article and complete the review assignment attached.
Requirements: Complete assignment
-
Business research
Kindly follow the
Requirements:
-
Sell meberane structure
Define this question
Requirements: